期刊文献+

基于ElGamal公钥体制的动态(k,n)门限密钥托管方案

Dynamic Threshold Key Escrow Scheme Based on ElGamal Public Cryptosystem
下载PDF
导出
摘要 首先对文献[3]所提出的门限密钥分割方案进行了整理分析,具体分析了其动态性,然后在此基础上提出了一种新的基于ElGamal公钥体制的动态(k,n)门限密钥托管方案.该方案具有如下特点:(1)可以防止阈下信道攻击;(2)在监听过程中,监听机构可以对托管代理交给其的子密钥进行验证;(3)解决了"一次监听,永久监听问题";(4)具有动态性质. A threshold secret key sharing scheme given by paper [3] is tidied up and analyzed, its dynamic is discussed, and a new dynamic ( k, n ) threshold scheme based on EIGamal public key cryptosystem is proposed. The scheme has the following properties: it can prevent subliminal attack, monitor department can verify correctness of the secret shadow which was given by escrow agent during monitor procedure, the problem of "once monitor, monitor forever" is solved, and it is dynamic.
出处 《佳木斯大学学报(自然科学版)》 CAS 2009年第1期39-41,共3页 Journal of Jiamusi University:Natural Science Edition
基金 黑龙江省教育厅面上项目(11521209) 黑龙江大学青年科学基金项目(QL200601)
关键词 (k n)门限 ElGamal公钥体制 密钥托管 动态性 ( k, n )threshold ELGamal cryptosystem key escrow dynamic
  • 相关文献

参考文献5

二级参考文献27

  • 1National Institute for Standards and Technology. Escrowed Encryption Standard. Federal Information Processing Standards Publication 185,U.S. Department of Commerce, 1994
  • 2ElGamal T.. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31(4): 469~472
  • 3Knudsen L.R., Pedersen T.P.. The differcultis on software key escrow. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Saragossa, Spain, 1996, 237~244
  • 4Shamir A.. Partial key escrow:A new approach to software key escrow. In:Proceedings of the Notes from Key Escrow Conference,Washington, D.C., 1995. http://www.isthe.com/chongo/tech/math/partial/pkedc3.html
  • 5Nechvatal J.. A Public-key-based key escrow system. Journal of Systems Software, 1996, 35(1): 73~83
  • 6Burmster M., Desmedt Y., Seberry J.. Equitable key escrow with limited time spa. In:Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, Beijing,China, 1998, 380~391
  • 7Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
  • 8Feng Deng-Guo,Pei Ding-Yi. An Introduction to Cryptography. Beijing: Science Press, 1999(in Chinese)(冯登国,裴定一. 密码学导引. 北京:科学出版社, 1999)
  • 9Simmons G.J.. The subliminal channel and digital signatures. In: Proceedings of the Workshop on the Theory and Applications of Cryptographic Techniques, Paris, France, 1984, 364~378
  • 10王育民,保密学.基础与应用,1990年

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部